Oracle Vulnerability Scanning

  • Paul Wright


This chapter will overview the vulnerability-scanning industry in terms of how it has developed and the commercial tools that are used. It will also introduce the tool I have used most, which is Perl based and enables custom interactions to be automated, such as scanning Database Control webpages to gain the database name, coupled with traditional TNS listener scanning for weak passwords. Finally, I will review some administrative and ethical considerations you should take before using the code in practice.


Database Estate Commercial Tool Patch Level Oracle Database Development Machine 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Paul Wright 2014

Authors and Affiliations

  • Paul Wright
    • 1
  1. 1.SurreyUK

Personalised recommendations